User Controls

  1. 1
  2. 2
  3. 3
  4. ...
  5. 31
  6. 32
  7. 33
  8. 34
  9. 35
  10. 36
  11. 37
  12. 38
  13. 39

Posts That Were Thanked by AngryOnion

  1. Niggers (or Africans, if you prefer) are the Universe's excrement.
    They are the negative, to contrast the positive.
    Everything in this Universe points to us living in a binary process, so there goes without saying that the Universe produces errors, such as niggers and people born with other disabilities and deformities.

    What we need to do as a society is get together and discuss this issue.
    The groids need to realize their situation and react respectfully and accept the reality that they are a disease and need to stop breeding.
    The same applies to all other handsome and well tanned individuals.
    The following users say it would be alright if the author of this post didn't die in a fire!
  2. -SpectraL coward [the spuriously bluish-lilac bushman]
    It's run by Dfg. Dfg was stupid enough to give TheDarkRodent global mod access, and then Rodent cleaned out the 30 or so users they had in a matter of months, every last one, leaving Dfg with nothing. It's a ghost ship BBS now.
    The following users say it would be alright if the author of this post didn't die in a fire!
  3. infinityshock Black Hole
    fucking faggots.
    The following users say it would be alright if the author of this post didn't die in a fire!
  4. aldra JIDF Controlled Opposition
    of course not officer
    The following users say it would be alright if the author of this post didn't die in a fire!
  5. mmQ Lisa Turtle
    Obv scron. Mr not Rattex himself . Zoinks!
    The following users say it would be alright if the author of this post didn't die in a fire!
  6. mmQ Lisa Turtle
    Originally posted by infinityshock go to the beach. durh.

    Wow what an interesting idea. Durrrrh.

    He said INTERESTING, not routine, standard, basic shit to do this summer.

    Oh yeah OP like go outside dude! Grab a bite to eat on a patio, have a drink! Go to a friend's house! You know, interesting shit like that man!

    ANYWAY...

    Depends a bit on your financial situation. You could do as G-Plast and spend the summer abroad (though he changed his mind this summer).

    You could volunteer at a park or somewhere outside, get some experience doing something like that.

    Walk around your town and do reviews on all the bars and restaurants, send them to a reputable local publication, maybe make a few bones.

    Get a dog and spent the summer training it to do all the kewlest trix. Take to dog park. Get bitche$.

    Get really good at frisbee golf, make bets with college kids, have fun and make cash doing it.
    The following users say it would be alright if the author of this post didn't die in a fire!
  7. Originally posted by RestStop I'm probably about to murder someone over $40 and a washer.

    Take their dryer too.

    The following users say it would be alright if the author of this post didn't die in a fire!
  8. aldra JIDF Controlled Opposition
    Originally posted by Kolokol-1 It's like people think he can do no wrong just because he's right wing.

    but 29D badminton!!!


    Short answer: he was idealistic coming into the presidency and the establishment made him their bitch.
    The following users say it would be alright if the author of this post didn't die in a fire!
  9. Originally posted by Kolokol-1 Books are shit and literacy is shit and words are shit. There was a time when we could communicate through paintings, and express ourselves in a much more meaningful way than words ever could.

    Now pick up that paintbush and get ready to experience communication in a whole new way

    there should be a subforum where we can only communicate in MSpaint cave paintings or get banned
    The following users say it would be alright if the author of this post didn't die in a fire!
  10. Lanny Bird of Courage
    Wanted to disable everyone from being able to make threads in this forum, but accidentally disabled it for everyone.

    It's fixed for your guys now, right?
    The following users say it would be alright if the author of this post didn't die in a fire!
  11. infinityshock Black Hole
    Roll up in a 2005 Honda Civic Econobox and no one wants to talk to you, much less acknowledge your presence.

    Same person rolls up in a 2017 Camaro SS convertible asshole-rupturer and suddenly everyone is your best friend and wants to compliment your choice in such a fine piece of machinery.

    Fuck off, juden.
    The following users say it would be alright if the author of this post didn't die in a fire!
  12. The following users say it would be alright if the author of this post didn't die in a fire!
  13. The plant with two sides of view


    The following users say it would be alright if the author of this post didn't die in a fire!
  14. The following users say it would be alright if the author of this post didn't die in a fire!
  15. Malice Naturally Camouflaged
    Originally posted by AngryOnion I scored a 35 does that mean I'm in the club??



    Originally posted by AngryOnion Or does that mean I'm reclusive alcoholic.

    Being reclusive and and alcoholic definitely align well with Asperger's. There's the whole GABAergic deficit and hypertrophied amygdala aspect causing issues with chronic anxiety, fear, apprehension, and the amplification of other negative emotions. And of course the recluse part fits well due to the above, along with social deficits, sensory hypersensitivity, etc.

    Probably part of the club. Could explain a lot and help you learn how to cope with it, work your way out of your problems.

    Benzos are a way better option than alcohol, btw.
    The following users say it would be alright if the author of this post didn't die in a fire!
  16. Sophie Pedophile Tech Support
    By now i am sure you have all heard about the WanaCryptor ransomworm.

    What you may not know however is that there was a very specific exploit used in combination with this ransomware/worm. So for some background, a while ago NSA offshoot EQUATIONGROUP was hacked by a group of people calling themselves "the Shadow Brokers". It was claimed a large arsenal of 0days and custom exploits were taken in the data breach. This later turned out to be true when the Shadow Brokers dumped all the tools they had online.


    One of the vulnerabilities disclosed by the leak was one called MS17-010. Which is a critical vulnerability in the way Windows handles the Server Message Block implementation or SMB. SMB is a file transfer protocol. The flaw here is the way in which SMB handles specially crafted requests. With the right request this can allow for remote code execution and it is in this way that the Ransomware acts as a worm as well.


    Once an initial foothold is gained the ransomware scans the local network for the SMB service. If found it will it will launch an exploit to propagate over the network and infect as many machines as possible. If you're interested BAE Systems has a detailed analysis report On the malwares functionality.



    In the mean time Rapid7 has added a module for the exploit dubbed EternalBlue to the metasploit framework. The details for which can be found by clicking here.


    Interestingly enough as you can read in the BAE Systems article, the malware had some sort of kill switch functionality. What it does is check for the existence of a certain domain, if the domain is found it stops the execution of the payload. This is most likely done as a sandbox evasion technique.

    Ironically, once researchers found this out they were quick to register the domain which resulted in a drop in infections. The interesting thing about this ransomware attack is that it used a nation-state level exploit to act as a worm and that contrary to the usual delivery mechanism(Phishing campaign) it would appear SMB services facing the internet were directly targeted by the malware.

    Furthermore, Microsoft has come out with a patch. You are advised to update if you run Windows as OS on any boxes you have. If you'd like to know if your Windows is vulnerable you can use this Python script to fins out.


    #!/usr/bin/python
    # -*- coding: utf-8 -*-

    #
    # References:
    #
    # https://blogs.technet.microsoft.com/msrc/2017/04/14/protecting-customers-and-evaluating-risk/
    # https://www.rapid7.com/db/modules/auxiliary/scanner/smb/smb_ms17_010
    # https://github.com/rapid7/metasploit-framework/blob/master/modules/auxiliary/scanner/smb/smb_ms17_010.rb
    # https://www.symantec.com/security_response/vulnerability.jsp?bid=96707
    # https://winprotocoldoc.blob.core.windows.net/productionwindowsarchives/MS-SMB2/[MS-SMB2]-151016.pdf
    # https://msdn.microsoft.com/en-us/library/windows/desktop/aa365233(v=vs.85).aspx
    # https://technet.microsoft.com/en-us/library/security/ms17-010.aspx
    # https://community.rapid7.com/community/metasploit/blog/2017/04/03/introducing-rubysmb-the-protocol-library-nobody-else-wanted-to-write
    # https://msdn.microsoft.com/en-us/library/ee441741.aspx
    # https://github.com/countercept/doublepulsar-detection-script/blob/master/detect_doublepulsar_smb.py
    # http://stackoverflow.com/questions/38735421/packing-an-integer-number-to-3-bytes-in-python
    # https://zerosum0x0.blogspot.com/2017/04/doublepulsar-initial-smb-backdoor-ring.html

    """
    $ python2.7 smb_exploit.py 192.168.206.152
    [+] [192.168.206.152] is likely VULNERABLE to MS17-010! (Windows 7 Ultimate 7600)

    $ python2.7 smb_exploit.py 192.168.206.130
    [+] [192.168.206.130] is likely VULNERABLE to MS17-010! (Windows 5.1)
    """

    from ctypes import *
    import socket
    import struct
    import logging


    logging.basicConfig(level=logging.INFO, format="%(message)s")
    log = logging.getLogger(__file__)

    # negotiate_proto_request
    # session_setup_andx_request
    # tree_connect_andx_request
    # peeknamedpipe_request
    # trans2 request


    class SMB_HEADER(Structure):
    """SMB Header decoder.
    """

    _pack_ = 1 # Alignment

    _fields_ = [
    ("server_component", c_uint32),
    ("smb_command", c_uint8),
    ("error_class", c_uint8),
    ("reserved1", c_uint8),
    ("error_code", c_uint16),
    ("flags", c_uint8),
    ("flags2", c_uint16),
    ("process_id_high", c_uint16),
    ("signature", c_uint64),
    ("reserved2", c_uint16),
    ("tree_id", c_uint16),
    ("process_id", c_uint16),
    ("user_id", c_uint16),
    ("multiplex_id", c_uint16)
    ]

    def __new__(self, buffer=None):
    return self.from_buffer_copy(buffer)

    def __init__(self, buffer):
    log.debug("server_component : %04x" % self.server_component)
    log.debug("smb_command : %01x" % self.smb_command)
    log.debug("error_class : %01x" % self.error_class)
    log.debug("error_code : %02x" % self.error_code)
    log.debug("flags : %01x" % self.flags)
    log.debug("flags2 : %02x" % self.flags2)
    log.debug("process_id_high : %02x" % self.process_id_high)
    log.debug("signature : %08x" % self.signature)
    log.debug("reserved2 : %02x" % self.reserved2)
    log.debug("tree_id : %02x" % self.tree_id)
    log.debug("process_id : %02x" % self.process_id)
    log.debug("user_id : %02x" % self.user_id)
    log.debug("multiplex_id : %02x" % self.multiplex_id)


    def generate_smb_proto_payload(*protos):
    """Generate SMB Protocol. Pakcet protos in order.
    """
    hexdata = []
    for proto in protos:
    hexdata.extend(proto)
    return "".join(hexdata)


    def calculate_doublepulsar_xor_key(s):
    """Calaculate Doublepulsar Xor Key
    """
    x = (2 * s ^ (((s & 0xff00 | (s << 16)) << 8) | (((s >> 16) | s & 0xff0000) >> 8)))
    x = x & 0xffffffff # this line was added just to truncate to 32 bits
    return x


    def negotiate_proto_request():
    """Generate a negotiate_proto_request packet.
    """
    log.debug("generate negotiate request")
    netbios = [
    '\x00', # 'Message_Type'
    '\x00\x00\x54' # 'Length'
    ]

    smb_header = [
    '\xFF\x53\x4D\x42', # 'server_component': .SMB
    '\x72', # 'smb_command': Negotiate Protocol
    '\x00\x00\x00\x00', # 'nt_status'
    '\x18', # 'flags'
    '\x01\x28', # 'flags2'
    '\x00\x00', # 'process_id_high'
    '\x00\x00\x00\x00\x00\x00\x00\x00', # 'signature'
    '\x00\x00', # 'reserved'
    '\x00\x00', # 'tree_id'
    '\x2F\x4B', # 'process_id'
    '\x00\x00', # 'user_id'
    '\xC5\x5E' # 'multiplex_id'
    ]

    negotiate_proto_request = [
    '\x00', # 'word_count'
    '\x31\x00', # 'byte_count'

    # Requested Dialects
    '\x02', # 'dialet_buffer_format'
    '\x4C\x41\x4E\x4D\x41\x4E\x31\x2E\x30\x00', # 'dialet_name': LANMAN1.0

    '\x02', # 'dialet_buffer_format'
    '\x4C\x4D\x31\x2E\x32\x58\x30\x30\x32\x00', # 'dialet_name': LM1.2X002

    '\x02', # 'dialet_buffer_format'
    '\x4E\x54\x20\x4C\x41\x4E\x4D\x41\x4E\x20\x31\x2E\x30\x00', # 'dialet_name3': NT LANMAN 1.0

    '\x02', # 'dialet_buffer_format'
    '\x4E\x54\x20\x4C\x4D\x20\x30\x2E\x31\x32\x00' # 'dialet_name4': NT LM 0.12
    ]

    return generate_smb_proto_payload(netbios, smb_header, negotiate_proto_request)


    def session_setup_andx_request():
    """Generate session setuo andx request.
    """
    log.debug("generate session setup andx request")
    netbios = [
    '\x00', # 'Message_Type'
    '\x00\x00\x63' # 'Length'
    ]

    smb_header = [
    '\xFF\x53\x4D\x42', # 'server_component': .SMB
    '\x73', # 'smb_command': Session Setup AndX
    '\x00\x00\x00\x00', # 'nt_status'
    '\x18', # 'flags'
    '\x01\x20', # 'flags2'
    '\x00\x00', # 'process_id_high'
    '\x00\x00\x00\x00\x00\x00\x00\x00', # 'signature'
    '\x00\x00', # 'reserved'
    '\x00\x00', # 'tree_id'
    '\x2F\x4B', # 'process_id'
    '\x00\x00', # 'user_id'
    '\xC5\x5E' # 'multiplex_id'
    ]

    session_setup_andx_request = [
    '\x0D', # Word Count
    '\xFF', # AndXCommand: No further command
    '\x00', # Reserved
    '\x00\x00', # AndXOffset
    '\xDF\xFF', # Max Buffer
    '\x02\x00', # Max Mpx Count
    '\x01\x00', # VC Number
    '\x00\x00\x00\x00', # Session Key
    '\x00\x00', # ANSI Password Length
    '\x00\x00', # Unicode Password Length
    '\x00\x00\x00\x00', # Reserved
    '\x40\x00\x00\x00', # Capabilities
    '\x26\x00', # Byte Count
    '\x00', # Account
    '\x2e\x00', # Primary Domain
    '\x57\x69\x6e\x64\x6f\x77\x73\x20\x32\x30\x30\x30\x20\x32\x31\x39\x35\x00', # Native OS: Windows 2000 2195
    '\x57\x69\x6e\x64\x6f\x77\x73\x20\x32\x30\x30\x30\x20\x35\x2e\x30\x00', # Native OS: Windows 2000 5.0
    ]

    return generate_smb_proto_payload(netbios, smb_header, session_setup_andx_request)


    def tree_connect_andx_request(ip, userid):
    """Generate tree connect andx request.
    """
    log.debug("generate tree connect andx request")

    netbios = [
    '\x00', # 'Message_Type'
    '\x00\x00\x47' # 'Length'
    ]

    smb_header = [
    '\xFF\x53\x4D\x42', # 'server_component': .SMB
    '\x75', # 'smb_command': Tree Connect AndX
    '\x00\x00\x00\x00', # 'nt_status'
    '\x18', # 'flags'
    '\x01\x20', # 'flags2'
    '\x00\x00', # 'process_id_high'
    '\x00\x00\x00\x00\x00\x00\x00\x00', # 'signature'
    '\x00\x00', # 'reserved'
    '\x00\x00', # 'tree_id'
    '\x2F\x4B', # 'process_id'
    userid, # 'user_id'
    '\xC5\x5E' # 'multiplex_id'
    ]

    ipc = "\\\\{}\IPC$\x00".format(ip)
    log.debug("Connecting to {} with UID = {}".format(ipc, userid))

    tree_connect_andx_request = [
    '\x04', # Word Count
    '\xFF', # AndXCommand: No further commands
    '\x00', # Reserved
    '\x00\x00', # AndXOffset
    '\x00\x00', # Flags
    '\x01\x00', # Password Length
    '\x1C\x00', # Byte Count
    '\x00', # Password
    ipc.encode(), # \\xxx.xxx.xxx.xxx\IPC$
    '\x3f\x3f\x3f\x3f\x3f\x00' # Service
    ]

    length = len("".join(smb_header)) + len("".join(tree_connect_andx_request))
    # netbios[1] = '\x00' + struct.pack('>H', length)
    netbios[1] = struct.pack(">L", length)[-3:]

    return generate_smb_proto_payload(netbios, smb_header, tree_connect_andx_request)


    def peeknamedpipe_request(treeid, processid, userid, multiplex_id):
    """Generate tran2 request
    """
    log.debug("generate peeknamedpipe request")
    netbios = [
    '\x00', # 'Message_Type'
    '\x00\x00\x4a' # 'Length'
    ]

    smb_header = [
    '\xFF\x53\x4D\x42', # 'server_component': .SMB
    '\x25', # 'smb_command': Trans2
    '\x00\x00\x00\x00', # 'nt_status'
    '\x18', # 'flags'
    '\x01\x28', # 'flags2'
    '\x00\x00', # 'process_id_high'
    '\x00\x00\x00\x00\x00\x00\x00\x00', # 'signature'
    '\x00\x00', # 'reserved'
    treeid,
    processid,
    userid,
    multiplex_id
    ]

    tran_request = [
    '\x10', # Word Count
    '\x00\x00', # Total Parameter Count
    '\x00\x00', # Total Data Count
    '\xff\xff', # Max Parameter Count
    '\xff\xff', # Max Data Count
    '\x00', # Max Setup Count
    '\x00', # Reserved
    '\x00\x00', # Flags
    '\x00\x00\x00\x00', # Timeout: Return immediately
    '\x00\x00', # Reversed
    '\x00\x00', # Parameter Count
    '\x4a\x00', # Parameter Offset
    '\x00\x00', # Data Count
    '\x4a\x00', # Data Offset
    '\x02', # Setup Count
    '\x00', # Reversed
    '\x23\x00', # SMB Pipe Protocol: Function: PeekNamedPipe (0x0023)
    '\x00\x00', # SMB Pipe Protocol: FID
    '\x07\x00',
    '\x5c\x50\x49\x50\x45\x5c\x00' # \PIPE\
    ]

    return generate_smb_proto_payload(netbios, smb_header, tran_request)


    def trans2_request(treeid, processid, userid, multiplex_id):
    """Generate trans2 request.
    """
    log.debug("generate tran2 request")
    netbios = [
    '\x00', # 'Message_Type'
    '\x00\x00\x4f' # 'Length'
    ]

    smb_header = [
    '\xFF\x53\x4D\x42', # 'server_component': .SMB
    '\x32', # 'smb_command': Trans2
    '\x00\x00\x00\x00', # 'nt_status'
    '\x18', # 'flags'
    '\x07\xc0', # 'flags2'
    '\x00\x00', # 'process_id_high'
    '\x00\x00\x00\x00\x00\x00\x00\x00', # 'signature'
    '\x00\x00', # 'reserved'
    treeid,
    processid,
    userid,
    multiplex_id
    ]

    trans2_request = [
    '\x0f', # Word Count
    '\x0c\x00', # Total Parameter Count
    '\x00\x00', # Total Data Count
    '\x01\x00', # Max Parameter Count
    '\x00\x00', # Max Data Count
    '\x00', # Max Setup Count
    '\x00', # Reserved
    '\x00\x00', # Flags
    '\xa6\xd9\xa4\x00', # Timeout: 3 hours, 3.622 seconds
    '\x00\x00', # Reversed
    '\x0c\x00', # Parameter Count
    '\x42\x00', # Parameter Offset
    '\x00\x00', # Data Count
    '\x4e\x00', # Data Offset
    '\x01', # Setup Count
    '\x00', # Reserved
    '\x0e\x00', # subcommand: SESSION_SETUP
    '\x00\x00', # Byte Count
    '\x0c\x00' + '\x00' * 12
    ]

    return generate_smb_proto_payload(netbios, smb_header, trans2_request)

    def check(ip, port=445):
    """Check if MS17_010 SMB Vulnerability exists.
    """
    try:
    buffersize = 1024
    timeout = 5.0

    # Send smb request based on socket.
    client = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
    client.settimeout(timeout)
    client.connect((ip, port))

    # SMB - Negotiate Protocol Request
    raw_proto = negotiate_proto_request()
    client.send(raw_proto)
    tcp_response = client.recv(buffersize)

    # SMB - Session Setup AndX Request
    raw_proto = session_setup_andx_request()
    client.send(raw_proto)
    tcp_response = client.recv(buffersize)

    netbios = tcp_response[:4]
    smb_header = tcp_response[4:36] # SMB Header: 32 bytes
    smb = SMB_HEADER(smb_header)

    user_id = struct.pack('<H', smb.user_id)

    # parse native_os from Session Setup Andx Response
    session_setup_andx_response = tcp_response[36:]
    native_os = session_setup_andx_response[9:].split('\x00')[0]

    # SMB - Tree Connect AndX Request
    raw_proto = tree_connect_andx_request(ip, user_id)
    client.send(raw_proto)
    tcp_response = client.recv(buffersize)

    netbios = tcp_response[:4]
    smb_header = tcp_response[4:36] # SMB Header: 32 bytes
    smb = SMB_HEADER(smb_header)

    tree_id = struct.pack('<H', smb.tree_id)
    process_id = struct.pack('<H', smb.process_id)
    user_id = struct.pack('<H', smb.user_id)
    multiplex_id = struct.pack('<H', smb.multiplex_id)

    # SMB - PeekNamedPipe Request
    raw_proto = peeknamedpipe_request(tree_id, process_id, user_id, multiplex_id)
    client.send(raw_proto)
    tcp_response = client.recv(buffersize)

    netbios = tcp_response[:4]
    smb_header = tcp_response[4:36]
    smb = SMB_HEADER(smb_header)

    # nt_status = smb_header[5:9]
    nt_status = struct.pack('BBH', smb.error_class, smb.reserved1, smb.error_code)

    # 0xC0000205 - STATUS_INSUFF_SERVER_RESOURCES - vulnerable
    # 0xC0000008 - STATUS_INVALID_HANDLE
    # 0xC0000022 - STATUS_ACCESS_DENIED

    if nt_status == '\x05\x02\x00\xc0':
    log.info("[+] [{}] is likely VULNERABLE to MS17-010! ({})".format(ip, native_os))

    # vulnerable to MS17-010, check for DoublePulsar infection
    raw_proto = trans2_request(tree_id, process_id, user_id, multiplex_id)
    client.send(raw_proto)
    tcp_response = client.recv(buffersize)

    netbios = tcp_response[:4]
    smb_header = tcp_response[4:36]
    smb = SMB_HEADER(smb_header)

    if smb.multiplex_id == 0x0051:
    key = calculate_doublepulsar_xor_key(smb.signature)
    log.info("Host is likely INFECTED with DoublePulsar! - XOR Key: {}".format(key))

    elif nt_status in ('\x08\x00\x00\xc0', '\x22\x00\x00\xc0'):
    log.info("[-] [{}] does NOT appear vulnerable".format(ip))
    else:
    log.info("[-] [{}] Unable to detect if this host is vulnerable".format(ip))

    except Exception as err:
    log.error("[-] [{}] Exception: {}".format(ip, err))
    finally:
    client.close()


    if __name__ == '__main__':
    import sys

    if len(sys.argv) != 2:
    print("{} <ip>".format(sys.argv[0]))
    sys.exit(1)
    else:
    check(sys.argv[1])



    The credits for which of course go to the original author. I would link you directly to a Github account but a lot of people have independently uploaded the same code so i don't know who exactly the original author is.


    In conclusion, if you are looking for samples of WanaCryptor, below i have linked all samples as they are known to me.

    Samples.

    https://www.hybrid-analysis.com/sample/ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa?environmentId=100
    https://transfer.sh/PnDIl/CYBERed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa.EXE
    https://transfer.sh/ZhnxR/CYBER1be0b96d502c268cb40da97a16952d89674a9329cb60bac81a96e01cf7356830.EXE (main dll)

    Binary blob in PE crypted with pass 'WNcry@2ol7'.

    parents https://pastebin.com/quvVH5hS (all known variants of the Wcry launcher containing eternalblue)
    children https://pastebin.com/A2pxw49F (all variants of Wcry, the actual ransomware, being currently observed in the wild)


    Further Reading.

    Post last edited by Sophie at 2017-05-17T22:23:36.599118+00:00

    Post last edited by Sophie at 2017-05-17T22:26:27.793561+00:00
    The following users say it would be alright if the author of this post didn't die in a fire!
  17. -SpectraL coward [the spuriously bluish-lilac bushman]
    Are you smoking dried banana peels?
    The following users say it would be alright if the author of this post didn't die in a fire!
  18. I don't have a profession. I chose to concentrate on making money and living on my terms.
    The following users say it would be alright if the author of this post didn't die in a fire!
  19. kroz weak whyte, frothy cuck, and former twink
    bill the cat is so retarded he can't even find his own porno
    The following users say it would be alright if the author of this post didn't die in a fire!
  20. Lanny Bird of Courage
    No, you niggerfag. Go ejaculate on an infant or something, I have an NIST report to read.
    The following users say it would be alright if the author of this post didn't die in a fire!
  1. 1
  2. 2
  3. 3
  4. ...
  5. 31
  6. 32
  7. 33
  8. 34
  9. 35
  10. 36
  11. 37
  12. 38
  13. 39
Jump to Top